Security Statement

Corporate Governance

Policies. The security policies and procedures are focused on preserving security in our systems, processes, and practices.

Information Security Team. Our security team works across the entire business to secure and protect any sensitive information related to the service. This team also formally reviews policies and procedures.

Risk Management. undertakes risk assessment practices to understand, prevent and manage and information security risks.


Employee Screening. screens new employees before they join the team and these screening activities may include criminal background and reference checks.

Confidentiality. employees are required to agree to protect and preserve any information they may view, process, or transmit as part of their job functions where that information may be deemed sensitive.

Security Training. trains our team to protect sensitive information and the devices they use. This training will include new hire awareness training and annual or ad-hoc training as required.

Data Privacy

Privacy Policy. The privacy policy describes how will collect, use, and protect the customer information where customer may use or interact with websites or configuring services in the Aperture Portal.

Personal Data Transfer. See our terms of service for additional information about regarding processing of personal data. The services by default do not process personal data.

Change Management

Change Processes. follows a procedural process when developing and deploying changes to technologies. Changes considered include systems and software which form the service

Change Testing. During the stages of development, will test changes. In advance of moving a proposed change to a production system,'s team will confirm tests are successful.

Change Notification. prepare change notices to maintain awareness among the team. These notices are reviewed and approved by relevant team members involved with system management.

Change Review. Following the introduction of changes to the production systems, review and agree changes have been successful.

Access Management

Access Requests. documents requests for access to the systems. Our team responsible for security, will then approve and grant access only where appropriate.

Access Management. amend any employees' levels of access to the systems subject to any change in an employee's role and/or responsibilities at

Access Review Process. reviews access levels across the team and systems to ensure the appropriate access to systems and data is maintained.

System Authentication and Account Access

User Accounts and Privileges. assigns unique accounts per user to each user who needs to access systems so we can manage, understand and enforce user-level accountability.

User Roles and Access Privileges. Roles and access levels are assigned to users to restrict access per system to the level required for each individual users to conduct their responsibilities.

Two factor authentication. systems require two factor authentication.

Application security

Secure development practices and processes. trains our development and operations teams to prevent common vulnerabilities.

Network and infrastructure

Security Scans and Tests. performs vulnerability scans and security tests on the systems. considers and deals with the findings of these scans and tests in an appropriate way in order to assist with maintaining system security.

Standards for System Configuration. For maintenance of system security, has documented Standards for System Configuration which the team is required to follow. These standards cover a range of system configuration elements including (but not limited to) ports, services and protocols.

Security Patching. monitors lists of security vulnerabilities so that when new items are raised, those vulnerabilities can be addressed immediately. Patches and updates are applied subject to the time frame necessary for criticality of the vulnerability identified.

Data Encryption

Encrypted Data Transmission.'s platform supports TLS and will provide customers with a solution to encrypt connections to end users and to the customers' origin servers.

Encryption Keys. To maintain security of customer Encryption Keys, protects access to the encryption keys provisioned by customers.

Continuity and Availability

Fail Over.'s network is built to support fail over of traffic from any individual delivery node (PoP) within a network should that PoP become unavailable for any reason. In addition, can move customer data to alternate networks without any interruption should for some reason an individual network provided by become unresponsive.

Redundancy. Leveraging major cloud providers such as AWS and Azure, has multiple services and peering access points available to the networks.

Monitoring.'s operations teams monitor a wide range of alerting interfaces to detect, monitor and understand degraded or otherwise detrimentally affected services 24x7x365.

Reporting. keep customers updated using real time alerting tools and methods (such as For specific customer issues, may contact a customer directly.


Response Plan. has a documented response plan to bring to bear in the case of an incident on the platform or systems. The plan is reviewed and updated subject to the changing nature of the platform and threat profile of the Internet. the plan include communication processes, systems and team management.

Notifications of Unauthorized Access. will notify customers who may be affected by any validated breach of the systems or any unauthorized disclosure of that customer's confidential information.

Analysis, Monitoring and Detection

Analysis. aggregate and securely store logs reflecting the activity on systems. monitor these logs to understand, alert, diagnose and manage security threats and or incidents.

Monitoring. use a number of systems to track system changes and ensure accountability and enforcement of the security standards.

Detection. has systems to help surface potential threats, incidents and intrusions. The team will be alerted to anomalies in these detection systems.

Customer Data

Cached Data. Temporarily cached data (what data, where and for how long) is managed by customers. From time to time, may directly manage these settings on behalf of the customer should the need arise per law as customers permit.

IP Addresses. may retain indefinitely any non-anonymized, non-aggregated client or subscriber IP addresses associated with suspicious activity that may pose a risk to the network or our customers, or that are associated with administrative connections to the service.

HTTP Requests. Customer and end-user content which passes through the network in response to requests launched by end-users creates data in the systems which use over time to monitor and manage the system reliability, availability, performance and security.

Physical Security. relies on major cloud infrastructure providers such as AWS and Azure which have PCI compliant data centers and the physical environment security which accompanies these standards.

Business Continuity. has deployed PoPs across a number of zones and networks and as such can seamlessly move customer traffic between nodes and/or networks without customer downtime.


If you have any questions about security on the website, please email us at

Last updated: 28th June 2017